This is 10% of my NMD design consultancy portfolio. A summary of the first 16 years of my professional experience as a product designer. A small part of the overall production that was recently digitalized. Only the last slide has a single image that tries to shrink the application of basic design concepts in the development of 10 new IT business ventures from 1993 to 2013. Thus the choice of this title, showing that it took me 34 years to learn a few steps about the reality of Design Thinking, which I used in the last 20 years of my Business Development experience. All the business summarized in that last slide, represent service solutions for the Loyalty and Prepaid verticals.
This is 10% of my NMD design consultancy portfolio. A summary of the first 16 years of my professional experience as a product designer. A small part of the overall production that was recently digitalized. Only the last slide has a single image that tries to shrink the application of basic design concepts in the development of 10 new IT business ventures from 1993 to 2013. Thus the choice of this title, showing that it took me 34 years to learn a few steps about the reality of Design Thinking, which I used in the last 20 years of my Business Development experience. All the business summarized in that last slide, represent service solutions for the Loyalty and Prepaid verticals.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
PEOPLE using voice to communicate over some distance.
I’m not limiting this to PSTN-style telephony. I also mean two-way radios, VoIP, or any other kind of thing where you talk into one end and your voice comes out the other end and hopefully goes into someone’s ear.
Our company got started by trying to fix some issues with military or tactical voice communication.
For tactical users, effective voice communication can be a matter of life and death, and when it is, there’s no time to stop and type out a text message.
While we working on how we could make tactical voice users more effective, we realized that many of the same problems that tactical users have with their communication tools are the same problems that mobile phone users have, except that mobile phone users aren’t get shot at as often, so they tend not to notice.
Making voice useful is relevant for both tactical and consumer applications.
It requires that we confront two key assumptions about voice communication systems and how they work.
The first assumption is that distance somehow matters.
Voice communication networks are an amazing way to collapse the distance between people, allowing them to interact as if they were in the same place at the same time.
But as the price of access to these wonderful networks continues to fall, the distance that voice travels matters less and less.
We find that the HUMAN TIME we spend PRODUCING, CONSUMING, and PROCESSING information in and out of these networks--OUR TIME is now the most scarce resource in communications.
Unfortunately, our tools aren’t always set up that way.
Modern telephony is not particularly concerned with saving people time. In many cases it is quite the opposite.
Before you can say something to someone using telephones, you have to do quite a bit of waiting.
2nd Assumption: An even bigger and more fundamental assumption that is baked in to voice communication is Live Only
Whether PTT, live phone call or even voicemail, the systems are built with the assumption that voice is live, or it doesn’t work.
If a live phone call fails to connect with another person, it is diverted on a live connection to a voicemail system.
Trying to set up these live voice circuits or sessions causes waiting, interruption, inconvenience, and the bizarre phenomenon of failed rendezvous.
I call you, get voicemail, you call me right back, but I’m dialing your voicemail, so you get my voicemail, and now both of us are on the phone, live, with the other person’s voicemail system.
Live Only costs us more than time spent waiting, there are also social costs. You know when you call someone that you are probably interrupting them and putting them in an awkward situation
Text communication is broken up into a series of messages, each of which can be dealt with at the users’ convenience.
Text is less intrusive and doesn’t require that the attention of both parties be synchronized in time. For a phone call to work, both parties need to devote their full attention to the call, at the same moment in time. Text is not so demanding. Because attention synchronization isn’t required, text even allows users to participate in multiple ongoing conversations at the same time.
For some situations and users then, text is a reasonable alternative to voice.
There ARE still situations where voice is a better mode, such as driving, walking, if you have a lot to say, or having a more personal conversation with someone.Rather, voice COULD be a better mode, but current voice systems don’t respect the time constraints and user expectations of the modern world.
So at RebelVox we wondered, how can we bring the flexibility of text-based communication to the efficient and expressive mode of the human voice?
What we came to is that we all need to move beyond Live Only.
Voice can be a lot more useful to people if it was as flexible in time as text is.
To give users the most efficient voice communication experience, we have to unlock the constraints of time, thankfully it turns out that computers are already pretty good at this.
In the same way that DVRs like TiVO have changed the user experience of television through time shifting, we can provide a new and more useful user experience for voice communication by doing time shifting in both directions.
Right now, there is some crude time shifting available for voice: voicemail. It only works in one direction, and it works by first intrusively ringing a phone.
What would it mean to FULLY EMBRACE time shifting for voice communications?
Here’s a 60 second video to show you how it could work.
Pause on last frame
If coordinating dinner plans between two people using voice would have taken 7 minutes, imagine how long it would have taken for 5 people.
What you just saw was one system, the same system, used for messaging, live voice, and a seamless transition between the two.
Because it is one system, there is no rendezvous problem, because there’s only one place to go.
Your non-live voice isn’t trapped in a separate messaging application, and your live voice sticks around in case you want to listen to it later.
By applying time shifting techniques to both sending and receiving, TWO WAY TIME SHIFTING, users are more efficient.
In this system, everything you say is stored in a time shifting buffer, then that buffer is synchronized with your recipients, who apply their own time shifting to what you’ve said.
With two way time shifting, you can use voice without waiting, without interrupting, and seamlessly transition into live if everybody is paying attention.
Let’s take a look at the user interface so you can see how this works.
This device looks suspiciously like an iPhone. We are not an iPhone app company, although our software does run on the iPhone. I think the iPhone UI works well and looks great, so I’m going to show you what two way time shifting could look like on that kind of device.
Sam wants to say something to Jill.
Doesn’t CALL her, doesn’t LEAVE MESSAGE.
Sam doesn’t have to wait for anything: neither Jill, nor marginal network, nor no network at all.
Now Jill and Sam have merged into the experience of a live, full-duplex phone call.
They hold their phones up to their faces and they talk.
The UI changes, but the underlying system is still doing the same thing.
This time shifting stuff is great for saving time and communicating without full attention synchronization.
But we can also help save people time that they would have spent waiting for the network, either to establish a connection, or when either party goes out of range of the network.
Modern mobile phones are increasingly powerful computers, but none of this power is being applied to make voice work better.
By utilizing storage and processing capabilities at the edges of the network, we can fix the rendezvous problem, and we can even fix dropped calls.
Of course we can’t really make the network deliver packets when there are none, but we can give the users at the edges of that network an optimal user experience when that happens.
For example, users can have some new options such as Keep Talking, knowing that their voice will make it to their recipient just as soon as the network will allow.
A key insight into the development of early packet networks, specifically internetworks, was that the edges are smart, and the middle is dumb.
If something gets lost in the dumb middle, the smart edges are capable of doing error correction and retransmission themselves.
Modern phones are capable of doing this for voice over packet networks, and it would be very useful for everybody if they would.
This is our new user experience for voice. It is a single system that supports live, non-live, and lets users move seamlessly between those two extremes.
Since text is already unlocked in time, it can be blended into the same interface.
By applying time shifting techniques to voice at the edges of the network, we can save people time and let them communicate more efficiently.